CVE-2023-53819
Description
In the Linux kernel, the following vulnerability has been resolved:
amdgpu: validate offset_in_bo of drm_amdgpu_gem_va
This is motivated by OOB access in amdgpu_vm_update_range when offset_in_bo+map_size overflows.
v2: keep the validations in amdgpu_vm_bo_map v3: add the validations to amdgpu_vm_bo_map/amdgpu_vm_bo_replace_map rather than to amdgpu_gem_va_ioctl
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing validation in the Linux kernel's AMDGPU driver allows out-of-bounds access via overflow of offset_in_bo+map_size.
Vulnerability
In the Linux kernel's AMDGPU driver, the drm_amdgpu_gem_va IOCTL did not properly validate the offset_in_bo parameter. When offset_in_bo combined with map_size overflows, it leads to an out-of-bounds (OOB) access in the amdgpu_vm_update_range function. This flaw was introduced because the validation was missing in the amdgpu_vm_bo_map and amdgpu_vm_bo_replace_map functions, which are called during GPU virtual address (VA) mapping operations [1][2].
Exploitation
An attacker with local access and the ability to submit DRM_IOCTL_AMDGPU_GEM_VA calls can trigger the overflow by crafting a large offset_in_bo value and map_size. No special privileges beyond standard user-space access to the AMDGPU device are required, as the IOCTL is available to unprivileged processes that can open the /dev/dri/renderD* device. The attack surface is limited to systems with AMD Radeon graphics hardware and the amdgpu` kernel module loaded [3].
Impact
Successful exploitation results in an out-of-bounds memory access within the kernel, which can cause a denial of service (system crash or hang) or potentially allow an attacker to corrupt kernel memory, leading to privilege escalation. The vulnerability is classified as a high-severity issue due to the possibility of arbitrary code execution in kernel context [4].
Mitigation
The fix was applied in Linux kernel stable releases. The patch adds validation of offset_in_bo in the amdgpu_vm_bo_map and amdgpu_vm_bo_replace_map functions to prevent the overflow. Users should update their kernel to a version containing the commit d83c337e654d or later. No workaround is available other than applying the patch [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
8968e27fd037e4300a47e4017b10db1d21374f015aadc0d97bc6dbf34dc4f9f0bcf49e98982aace80cfaad83c337e654dVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/4300a47e4017c9febb60ffa7d39723eeaed00f2bnvd
- git.kernel.org/stable/c/82aace80cfaab778245bd2f9e31b67953725e4d0nvd
- git.kernel.org/stable/c/968e27fd037ec4732068820a9b9836eccc0e0a12nvd
- git.kernel.org/stable/c/9f0bcf49e9895cb005d78b33a5eebfa11711b425nvd
- git.kernel.org/stable/c/b10db1d2137415e5e7f9706d96cfe77539c499d4nvd
- git.kernel.org/stable/c/bc6dbf34dc4fb639522f3e8e66ef05997c0441eenvd
- git.kernel.org/stable/c/d83c337e654d58d3edd15a2ae76e87dc601c07d9nvd
- git.kernel.org/stable/c/f015aadc0d973047f49526a127e900c488d4e425nvd
News mentions
0No linked articles in our index yet.